Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 4 Nov 1998 20:10:00 +1300 (NZDT)
From:      Andrew McNaughton <andrew@squiz.co.nz>
To:        Nicholas Charles Brawn <ncb05@uow.edu.au>
Cc:        Warner Losh <imp@village.org>, FreeBSD-security@FreeBSD.ORG
Subject:   Re: [rootshell] Security Bulletin #25 (fwd) 
Message-ID:  <Pine.BSF.4.01.9811041946050.780-100000@aniwa.sky>
In-Reply-To: <Pine.SOL.4.02A.9811041627410.24210-100000@banshee.cs.uow.edu.au>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 4 Nov 1998, Nicholas Charles Brawn wrote:

> Well I just grabbed 1.2.26 and did: 
> find . -exec grep sprintf {} \; |wc -l 
> 
> And came up with 138 lines. Just having sprintf() in your code is not
> indicative of a vulnerability, but it's still a high number.

ssh is commonly used for piping substantial ammounts of data, and can
probably claim good reasons for using the faster non-bounds-checking
routines in many of these cases.  Doesn't apply to low volume things like
the logging routines though. 

Andrew


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.01.9811041946050.780-100000>